PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

Similar documents
GSLC. GIAC Security Leadership.

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

CompTIA E2C Security+ (2008 Edition) Exam Exam.

EXAMGOOD QUESTION & ANSWER. Accurate study guides High passing rate! Exam Good provides update free of charge in one year!

CompTIA Security+(2008 Edition) Exam

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year


This course prepares candidates for the CompTIA Network+ examination (2018 Objectives) N

CTS2134 Introduction to Networking. Module 08: Network Security

Ethical Hacking and Prevention

Securing Wireless LANs with Certificate Services

تاثیرفناوری اطالعات برسازمان ومدیریت جلسه هشتم و نهم

CompTIA Network+ Study Guide Table of Contents

Actual4Test. Actual4test - actual test exam dumps-pass for IT exams

Security+ SY0-501 Study Guide Table of Contents

Training UNIFIED SECURITY. Signature based packet analysis

Chapter 10: Security. 2. What are the two types of general threats to computer security? Give examples of each.

Implementing Security in Windows 2003 Network (70-299)

CompTIA Security+ E2C (2011 Edition) Exam.

MCSA Windows Server 2012

MCSE Server Infrastructure. This Training Program prepares and enables learners to Pass Microsoft MCSE: Server Infrastructure exams

GISF. GIAC Information Security Fundamentals.

Implementing and Administering Security in a Microsoft Windows 2000 Network Course 2820 Five days Instructor-led Published: February 17, 2004

KNOWLEDGE SOLUTIONS. MIC2823 Implementing and Administering Security in a Microsoft Windows Server 2003 Network 5 Day Course

Securing Wireless Networks by By Joe Klemencic Mon. Apr

Exam Questions CWSP-205

CompTIA Security+ (Exam SY0-401)

Chapter 9. Firewalls

CompTIA Security+ Certification

Comptia.Certkey.SY0-401.v by.SANFORD.362q. Exam Code: SY Exam Name: CompTIA Security+ Certification Exam

Software Development & Education Center Security+ Certification

GCIA. GIAC Certified Intrusion Analyst.

BraindumpsIT. BraindumpsIT - IT Certification Company provides Braindumps pdf!

Course overview. CompTIA Security+ Certification (Exam SY0-501) Study Guide (G635eng v107)

ACS-3921/ Computer Security And Privacy. Chapter 9 Firewalls and Intrusion Prevention Systems

ROYAL INSTITUTE OF INFORMATION & MANAGEMENT

Information Security in Corporation

GSEC Q&As GIAC Security Essentials Certification

Pass Microsoft Exam

Exam Questions Demo Microsoft. Exam Questions

DumpsTorrent. Latest dumps torrent provider, real dumps

Chapter Three test. CompTIA Security+ SYO-401: Read each question carefully and select the best answer by circling it.

JPexam. 最新の IT 認定試験資料のプロバイダ IT 認証であなたのキャリアを進めます

AURA ACADEMY Training With Expertised Faculty Call Us On For Free Demo

GCIH. GIAC Certified Incident Handler.

Advanced Security Measures for Clients and Servers

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

Chapter 11: Networks

Course Content of MCSA ( Microsoft Certified Solutions Associate )

Expected Outcomes Able to design the network security for the entire network Able to develop and suggest the security plan and policy

R5: Configuring Windows Server 2008 R2 Network Infrastructure

Identify the features of network and client operating systems (Windows, NetWare, Linux, Mac OS)

MCSA Windows Server 2012

Active Directory Services with Windows Server

Exam Questions

Exam : Title : Security Solutions for Systems Engineers. Version : Demo

Identity with Windows Server 2016

CISSP CEH PKI SECURITY + CEHv9: Certified Ethical Hacker. Upcoming Dates. Course Description. Course Outline

Part 1. Lecturer: Prof. Mohamed Bettaz Coordinator: Prof. Mohamed Bettaz Internal Examiner: Dr. Mourad Maouche. Examination Paper

Children s Health System. Remote User Policy

What action do you want to perform by issuing the above command?

TestOut Network Pro - English 5.0.x COURSE OUTLINE. Modified

Network Security and Cryptography. 2 September Marking Scheme

IT Certification Exams Provider! Weofferfreeupdateserviceforoneyear! h ps://

M20742-Identity with Windows Server 2016

Exam Name: Pro: Upgrading to Windows 7 MCITP Enterprise Desktop Support Technician

FRONT RUNNER DIPLOMA PROGRAM Version 8.0 INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months

Designing and Implementing a Server 2012 Infrastructure

Step-by-Step Configuration

Cyber Security Practice Questions. Varying Difficulty

PracticeDump. Free Practice Dumps - Unlimited Free Access of practice exam

Chapter 11: It s a Network. Introduction to Networking

Introduction. Controlling Information Systems. Threats to Computerised Information System. Why System are Vulnerable?

20742: Identity with Windows Server 2016

MTA Networking Fundamentals Exam.

Designing and Implementing a Server Infrastructure

Vendor: CompTIA. Exam Code: Exam Name: CompTIA A+ Certification Exam (902) Version: Demo

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

Identity with Windows Server 2016

METHODOLOGY This program will be conducted with interactive lectures, PowerPoint presentations, discussions and practical exercises.

Active Directory Services with Windows Server

Installing and Configuring Windows Server 2012

MOC 6420A: Fundamentals of Windows Server 2008 Network and Applications Infrastructure

BraindumpsVCE. Best vce braindumps-exam vce pdf free download

70-742: Identity in Windows Server Course Overview

CND Exam Blueprint v2.0

Education Network Security

TestOut Network Pro - English 4.1.x COURSE OUTLINE. Modified

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

SonicWALL Addendum. A Supplement to the SonicWALL Internet Security Appliance User's Guide

Gigabit SSL VPN Security Router

Microsoft Certified Solutions Associate (MCSA)

Securing Access to Network Devices

Step-by-Step Configuration

Pearson CISSP Lab. Course Outline. Pearson CISSP Lab. 05 Apr

COMPUTER NETWORK SECURITY

Microsoft Certified System Engineer

Microsoft Certified Solutions Expert (MCSE)

Course 831 Certified Ethical Hacker v9

Transcription:

PASS4TEST IT Certification Guaranteed, The Easy Way! \ http://www.pass4test.com We offer free update service for one year

Exam : GSLC Title : GIAC Security Leadership Certification (GSLC) Vendors : GIAC Version : DEMO

1.Which of the following is used to describe the type of FTP access in which a user does not have permissions to list the contents of directories, but can access the contents if he knows the path and file name? A. Secure FTP B. Blind FTP C. Passive FTP D. Hidden FTP Answer: B 2.Which system is designed to analyze, detect, and report on security-related events.? A. HIPS B. NIPS C. NIDS D. HIDS Answer: B 3.Which of the following viruses is designed to prevent antivirus researchers from examining its code by using various methods that make tracing and disassembling difficult? A. Armored virus B. Stealth virus C. Multipartite virus D. Polymorphic virus 4.Which of the following provides security by implementing authentication and encryption on Wireless LAN (WLAN)? A. WEP B. WAP C. L2TP D. IPSec 5.Which of the following are the examples of administrative controls? Each correct answer represents a complete solution. Choose all that apply. A. Security policy B. Auditing C. Security awareness training D. Data Backup, C 6.John works as a Programmer for We-are-secure Inc. On one of his routine visits to the company, he noted down the passwords of the employees while they were typing them on their computer screens. Which of the following social engineering attacks did he just perform? A. Shoulder surfing 2 / 13

B. Important user posing C. Dumpster diving D. Authorization by third party 7.You work as a Network Administrator for Infonet Inc. The company has a Windows Server 2008 domain-based network. The network has three Windows Server 2008 member servers and 150 Windows Vista client computers. According to the company's security policy, you want to apply a firewall profile to the network.choose the firewall profiles supported by Windows Server 2008 and Windows Vista. A. 8.Drag and Drop the layers of TCP/IP model according to their level of data encapsulation. 3 / 13

A. 9.Which of the following encryption algorithms is applied in the PGP encryption system? A. TDE B. Triple DES 4 / 13

C. Blowfish D. IDEA Answer: D 10.Rick, the Network Administrator of the Fimbry Hardware Inc., wants to design the initial test model for Internet Access. He wants to fulfill the following goals: No external traffic should be allowed into the network. Administrators should be able to restrict the websites which can be accessed by the internal users. Which of the following technologies should he use to accomplish the above goals? (Click the Exhibit button on the toolbar to see the case study.) A. Internet Connection Sharing (ICS) B. Network Address Translator (NAT) C. Firewall D. Proxy Server E. Routing and Remote Access Service (RRAS) Answer: D 11.You work as a Network Administrator for Net Perfect Inc. The company has a Windows Server 2008 network environment. The network is configured as a Windows Active Directory-based single forest single domain network. The domain functional level is set to Windows Server 2003. You have configured an Active Directory-integrated DNS zone on the network. A new security policy dictates that each incoming DNS query should be recorded. Which of the following steps will you take to implement the new security policy? A. Create a GPO. Configure Audit Object Access. Attach the GPO to the domain. B. Do nothing, each incoming DNS queries is recorded by default in DNS.LOG file. C. Enable debug logging on the DNS server. D. Create a new OU. Move the DNS server account to the OU. Create a GPO. Configure Audit Logon events. Attach the GPO to the OU. Answer: C 12.Which of the following are the goals of risk management? Each correct answer represents a complete solution. Choose three. A. Identifying the risk B. Finding an economic balance between the impact of the risk and the cost of the countermeasure C. Identifying the accused D. Assessing the impact of potential threats, B, D 5 / 13

13.You work as a Network Administrator for Net World International. The company has a Windows Server 2008 network environment. The network is configured as a Windows Active Directory-based single domain single forest network. The functional level of the forest is Windows Server 2008. All client computers on the network run Windows Vista Ultimate. You configure a public key infrastructure (PKI) on the network. You configure a root CA and a subordinate CA on the network. For security reasons, you want to take the root CA offline. You are required to configure the CA servers to support for certificate revocation. Choose the steps you will take to accomplish the task. A. 14.The promiscuous mode is a configuration of a network card that makes the card pass all traffic it receives to the central processing unit rather than just packets addressed to it. Which of the following tools works by placing the host system network card into the promiscuous mode? A. Sniffer B. THC-Scan C. NetStumbler D. Snort 15.Janet is the project manager of the NHQ Project for her company. Janet is nearly done leading the project and there have been no cost or schedule overruns in the development of the new software for her company. The project team has been completing their work on time and there is still $75,000 left in the project budget. Janet decides to have the project team implement some extra features to the project scope to use all of the $75,000 in the budget even though the customer didn't specifically ask for the added features. This scenario is an example of which one of the following? 6 / 13

A. Scope creep B. Gold plating C. Change management D. Value added change Answer: B 16.You are responsible for security at a company that uses a lot of Web applications. You are most concerned about flaws in those applications allowing some attacker to get into your network. What method would be best for finding such flaws? A. Automated penetration testing B. Code review C. Manual penetration testing D. Vulnerability scanning Answer: D 17.You work as a Network Administrator for Net World International. The company has a Windows Server 2008 network environment. The network is configured as a Windows Active Directory-based single domain single forest network. The functional level of the forest is Windows Server 2008. All client computers on the network run Windows Vista Ultimate. You are configuring a public key interface (PKI) to support domain users and computers. All users will use smart cards for logon. You have configured a global group named SCIssuer that will issue smart cards for all domain users. A file server named SecServer is configured on the network. The certificate-based IPSec encryption is required for all communications to and from the SecServer server. A VPN server is configured on the network to enable sales managers to connect to the network remotely using their laptops which run Windows Vista Ultimate. The L2TP connection is required for the VPN server. Place the users, computers, and groups to the certificate templates that are required for implementing the PKI infrastructure. 7 / 13

A. 18.Drop the appropriate value to complete the formula. 8 / 13

A. 19.Fill in the blank with the appropriate word. A is a computer system on the Internet that is expressly set up to attract and trap people who attempt to penetrate other people's computer systems. A. honeypot 20.Which of the following protocols is used as a transport protocol for Internet dial-up connections? A. SMTP B. SNMP C. DHCP D. PPP Answer: D 21.You work as a Network Administrator for Tech Perfect Inc. The company has a Windows Server 2008 Active Directory-based single domain single forest network. The functional level of the forest is Windows Server 2008. The company's headquarters is located at Los Angeles. A branch office of the company is located at Denver. You are about to send a message to Rick who is a Network Administrator at Denver. You want to ensure that the message cannot be read by anyone but the recipient. Which of the following keys will you use to encrypt the message? A. Your public key B. The recipient's private key C. The recipient's public key D. Your private key Answer: C 9 / 13

22.Which of the following programs can collect various types of personal information, such as Internet surfing habits, and Web sites that the user has visited? A. Spyware B. Honeypot C. Worm D. Malware 23.You work as a Network Administrator for Perfect Solutions Inc. The company has a Windows Active Directory-based single domain single forest network. The company's network is connected to the Internet through a T1 line. The firewall is configured on the network for securing the internal network from the intruders on the Internet. The functional level of the forest is Windows Server 2003. You are designing a public key infrastructure (PKI) for the network. The security policy of the company states that all users should use smart cards for authentication. Select and place the type of certificate authority (CA) that is required to be configured on the network to implement the security policy of the company. A. 24.Which of the following applications would be considered a data warehousing application? A. Golf score tracking B. Badge reader C. Fraud detection D. ecommerce site Answer: C 25.Which of the following options is an approach to restricting system access to authorized users? A. MIC 10 / 13

B. MAC C. RBAC D. DAC Answer: C 26.Mark works as a Network Administrator for Infonet Inc. The company has a Windows 2000 Active Directory domain-based network. The domain contains one hundred Windows XP Professional client computers. Mark is deploying an 802.11 wireless LAN on the network. The wireless LAN will use Wired Equivalent Privacy (WEP) for all the connections. According to the company's security policy, the client computers must be able to automatically connect to the wireless LAN. However, the unauthorized computers must not be allowed to connect to the wireless LAN and view the wireless network. Mark wants to configure all the wireless access points and client computers to act in accordance with the company's security policy. What will he do to accomplish this? Each correct answer represents a part of the solution. Choose three. A. Configure the authentication type for the wireless LAN to Open system. B. Install a firewall software on each wireless access point. C. Configure the authentication type for the wireless LAN to Shared Key. D. Disable SSID Broadcast and enable MAC address filtering on all wireless access points. E. Broadcast SSID to connect to the access point (AP). F. On each client computer, add the SSID for the wireless LAN as the preferred network. Answer: C, D. F 27.You are the project manager for your organization and are trying to determine which vendor your organization will use. You have determined that any vendor that would like to bid on your project work will need to have a Microsoft Certified System Engineer on staff, have eight years of Cisco experience, and have at least two references from similar projects. What have you created in this scenario? A. Screening system for the vendors B. Weighting system for the vendors C. Preferred vendors list D. Bidders conference 28.Which of the following tools is based on Linux and used to carry out the Penetration Testing? A. JPlag B. BackTrack C. Vedit D. Ettercap Answer: B 29.A wireless network uses multiple modulation schemes to make the signal strong so that it can travel far. These modulation schemes work with a certain IEEE standard. Choose and drop the correct standards in the right pane according to the modulation scheme. 11 / 13

A. 30.Fill in the blank with the appropriate type of router. 12 / 13

A router performs packet-filtering and is used as a firewall. A. screening 13 / 13